Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: London

Region: England

Country: United Kingdom

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 81.19.219.219
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 16943
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;81.19.219.219.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026051900 1800 900 604800 86400

;; Query time: 56 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed May 20 01:00:06 CST 2026
;; MSG SIZE  rcvd: 106
Host info
219.219.19.81.in-addr.arpa domain name pointer 81-19-219-219.infrawat.ch.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
219.219.19.81.in-addr.arpa	name = 81-19-219-219.infrawat.ch.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
106.13.17.8 attack
Nov  4 01:41:01 plusreed sshd[32380]: Invalid user testpass from 106.13.17.8
...
2019-11-04 20:45:42
177.27.194.26 attack
Unauthorised access (Nov  4) SRC=177.27.194.26 LEN=44 TOS=0x10 PREC=0x40 TTL=50 ID=14185 TCP DPT=23 WINDOW=15138 SYN
2019-11-04 20:07:46
13.76.231.235 attackbotsspam
Nov  3 22:36:43 eola sshd[2259]: Invalid user pck from 13.76.231.235 port 55622
Nov  3 22:36:43 eola sshd[2259]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=13.76.231.235 
Nov  3 22:36:45 eola sshd[2259]: Failed password for invalid user pck from 13.76.231.235 port 55622 ssh2
Nov  3 22:36:46 eola sshd[2259]: Received disconnect from 13.76.231.235 port 55622:11: Bye Bye [preauth]
Nov  3 22:36:46 eola sshd[2259]: Disconnected from 13.76.231.235 port 55622 [preauth]
Nov  3 22:44:42 eola sshd[2530]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=13.76.231.235  user=r.r
Nov  3 22:44:44 eola sshd[2530]: Failed password for r.r from 13.76.231.235 port 60516 ssh2
Nov  3 22:44:44 eola sshd[2530]: Received disconnect from 13.76.231.235 port 60516:11: Bye Bye [preauth]
Nov  3 22:44:44 eola sshd[2530]: Disconnected from 13.76.231.235 port 60516 [preauth]


........
-----------------------------------------------
https://www.blocklist.de/
2019-11-04 20:44:21
106.12.74.238 attackbots
Nov  3 20:53:50 tdfoods sshd\[7199\]: Invalid user 3lch3 from 106.12.74.238
Nov  3 20:53:50 tdfoods sshd\[7199\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.74.238
Nov  3 20:53:52 tdfoods sshd\[7199\]: Failed password for invalid user 3lch3 from 106.12.74.238 port 54576 ssh2
Nov  3 20:59:10 tdfoods sshd\[7613\]: Invalid user 12071974 from 106.12.74.238
Nov  3 20:59:10 tdfoods sshd\[7613\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.74.238
2019-11-04 20:43:20
162.252.57.45 attackspambots
2019-11-04T00:27:58.451706mail.arvenenaske.de sshd[2422]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.252.57.45  user=r.r
2019-11-04T00:28:00.422348mail.arvenenaske.de sshd[2422]: Failed password for r.r from 162.252.57.45 port 60376 ssh2
2019-11-04T00:33:11.997272mail.arvenenaske.de sshd[2435]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.252.57.45  user=r.r
2019-11-04T00:33:13.937597mail.arvenenaske.de sshd[2435]: Failed password for r.r from 162.252.57.45 port 43366 ssh2
2019-11-04T00:36:55.529718mail.arvenenaske.de sshd[2450]: Invalid user temp from 162.252.57.45 port 54590
2019-11-04T00:36:55.535378mail.arvenenaske.de sshd[2450]: pam_sss(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.252.57.45 user=temp
2019-11-04T00:36:55.538329mail.arvenenaske.de sshd[2450]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh rus........
------------------------------
2019-11-04 20:30:11
136.169.21.26 attackbots
Port 1433 Scan
2019-11-04 20:45:13
192.168.1.201 attackbots
Port 1433 Scan
2019-11-04 20:10:13
203.210.197.140 attackspambots
Unauthorised access (Nov  4) SRC=203.210.197.140 LEN=52 TTL=52 ID=6899 TCP DPT=445 WINDOW=8192 SYN
2019-11-04 20:34:32
129.28.142.81 attack
$f2bV_matches
2019-11-04 20:26:33
202.71.14.40 attackbotsspam
Automatic report - Banned IP Access
2019-11-04 20:26:17
131.213.199.29 attackbotsspam
Open Proxy "ZEUS" node. GET "/wp-admin/admin-ajax.php", and get any others "ajax.php".
2019-11-04 20:11:11
80.211.35.16 attackspam
Nov  4 08:39:59 work-partkepr sshd\[492\]: Invalid user sisadmin from 80.211.35.16 port 50636
Nov  4 08:39:59 work-partkepr sshd\[492\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.211.35.16
...
2019-11-04 20:22:18
222.186.173.183 attack
Nov  4 13:38:46 nextcloud sshd\[5668\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.173.183  user=root
Nov  4 13:38:48 nextcloud sshd\[5668\]: Failed password for root from 222.186.173.183 port 56890 ssh2
Nov  4 13:38:52 nextcloud sshd\[5668\]: Failed password for root from 222.186.173.183 port 56890 ssh2
...
2019-11-04 20:42:49
222.122.94.18 attackspam
$f2bV_matches
2019-11-04 20:13:18
73.119.90.63 attackbots
Unauthorised access (Nov  4) SRC=73.119.90.63 LEN=40 TOS=0x10 PREC=0x40 TTL=53 ID=2914 TCP DPT=8080 WINDOW=29769 SYN 
Unauthorised access (Nov  4) SRC=73.119.90.63 LEN=40 TOS=0x10 PREC=0x40 TTL=53 ID=17278 TCP DPT=8080 WINDOW=29769 SYN
2019-11-04 20:26:51

Recently Reported IPs

89.21.67.169 81.19.216.82 217.146.80.107 216.175.47.217
212.11.152.125 210.216.157.177 207.219.65.238 206.224.219.142
202.168.51.226 209.23.9.170 2.180.95.42 2606:4700:10::6816:632
198.75.172.142 190.130.136.100 187.108.61.54 185.19.140.252
183.157.168.2 174.169.202.253 173.208.135.12 172.28.31.195